S.No |
Articles |
Ref. No |
1 |
Review of Role Based Access Control Method for Securing User Space in Cloud Computing
- Mrs.Sunitha B.S , Dr.Anir Ban Basu
|
IJCTT-V14P106 |
2 |
Implementation of Path Finding Algorithms in a 3-Dimentional Environment
- Firas Abdullah Thweny Al-Saedi , Fadi Khalid Ibrahim
|
IJCTT-V14P107 |
3 |
Run Time Bubble Sort – An Enhancement of Bubble Sort
- Harish Rohil , Manisha
|
IJCTT-V14P109 |
4 |
Detection of Voiced, Unvoiced and Silence Regions of Assamese Speech by Using Acoustic Features
- Bidyut Kumar Das , Ajit Das , Utpal Bhattacharjee
|
IJCTT-V14P111 |
5 |
Green Computing
- Biswajit Saha
|
IJCTT-V14P112 |
6 |
Selection of Most Appropriate Backpropagation Training Algorithm in Data Pattern Recognition
- Hindayati Mustafidah , Sri Hartati , Retantyo Wardoyo , Agus Harjoko
|
IJCTT-V14P120 |
7 |
Iris Recognition based on Wavelet Transform and Probabilistic Neural Network
- Azade Bastani
|
IJCTT-V14P121 |
8 |
Real Time and Past Positional Location Analysis of Friends in a Social Network Using Smart Devices
- Dr. Sanjeev Dhawan , Nishu Dhundwal
|
IJCTT-V14P126 |
9 |
Robust Intrusion Detection Mechanism for Mobile Adhoc Networks
- Ms. Rasagna Chinthireddy , Dr. S Arvind
|
IJCTT-V14P129 |